National Cyber Warfare Foundation (NCWF)

Attacks

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
APT36 hackers abuse Linux .desktop files to install malware in new attacks - BleepingComputer
0 user ratings
2025-08-22 19:47:22
By: milo
Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools - GBHackers News
0 user ratings
2025-08-22 19:12:11
By: milo
Arch Linux remains under attack as DDoS enters week 2 - here's a workaround
0 user ratings
2025-08-22 19:01:03
By: milo
FBI Warns of Russian Hackers Targeting U.S. Infrastructure - RealClearDefense
0 user ratings
2025-08-22 18:54:26
By: milo
APT36 hackers abuse Linux .desktop files to install malware - BleepingComputer
0 user ratings
2025-08-22 18:54:25
By: milo
Operation Serengeti 2.0: INTERPOL nabs 1,209 cybercriminals in Africa, seizes $97M
0 user ratings
2025-08-22 18:41:13
By: milo
Women s stolen details will not be published by Nova hackers - dutchnews.nl
0 user ratings
2025-08-22 18:18:22
By: milo
AI Models Resize Photos and Open Door to Hacking - BankInfoSecurity
0 user ratings
2025-08-22 17:25:22
By: milo
China-nexus hacker Silk Typhoon targeting cloud environments - Cybersecurity Dive
0 user ratings
2025-08-22 17:25:22
By: milo
Confessions of a teenage hacker: Simple passwords made it easy to infiltrate banks, hospitals and governments - thenationalnews.com
0 user ratings
2025-08-22 17:07:12
By: milo
Finding A New Model For Hacker Camps - Hackaday
0 user ratings
2025-08-22 17:07:11
By: milo
AI Models Resize Photos and Open Door to Hacking - GovInfoSecurity
0 user ratings
2025-08-22 17:07:10
By: milo
Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America - SecurityWeek
0 user ratings
2025-08-22 16:49:22
By: milo
2M+ Application Attacks Blocked in Real Time | July ADR Report | Contrast Security
0 user ratings
2025-08-22 16:16:13
By: milo
Russia-Sponsored Cyber Attack Campaign Targets Networking Devices, Critical Infrastructure
0 user ratings
2025-08-22 16:10:54
By: milo
Breach Roundup: Scattered Spider Hacker Gets 10 Years - BankInfoSecurity
0 user ratings
2025-08-22 15:57:25
By: milo
Major flaw in top password managers lets hackers steal your login details, 2FA codes, credit card info and more - Tom's Guide
0 user ratings
2025-08-22 15:48:48
By: milo
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members - CyberSecurityNews
0 user ratings
2025-08-22 15:40:13
By: milo
Instagram hack spreads as multiple stars, including Adele, share Future s Freebandz image - The Express Tribune
0 user ratings
2025-08-22 15:31:21
By: milo
Hackers Abuse VPS Infrastructure for Stealth, Speed - Dark Reading
0 user ratings
2025-08-22 14:30:04
By: milo
Researchers in South Korea analyzed that the hacker group that attacked South Korean mobile carriers.. -
0 user ratings
2025-08-22 14:04:20
By: milo
Hackers Accessed 850,000 Orange Belgium Customer Accounts - Insurance Journal
0 user ratings
2025-08-22 13:56:25
By: milo
Will the Real Executive Please Stand Up?
0 user ratings
2025-08-22 13:49:15
By: milo
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day - SecurityWeek
0 user ratings
2025-08-22 13:48:04
By: milo
Hackers disrupt communications of dozens of Iranian oil and cargo ships Iran International -
0 user ratings
2025-08-22 13:30:17
By: milo
This forum has 226 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.